Katrina Ligett

ORCID: 0000-0003-2780-6656
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Auction Theory and Applications
  • Game Theory and Applications
  • Cryptography and Data Security
  • Advanced Bandit Algorithms Research
  • Game Theory and Voting Systems
  • Privacy, Security, and Data Protection
  • Economic theories and models
  • Complexity and Algorithms in Graphs
  • Stochastic Gradient Optimization Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Experimental Behavioral Economics Studies
  • Consumer Market Behavior and Pricing
  • Optimization and Search Problems
  • Machine Learning and Algorithms
  • Advanced Causal Inference Techniques
  • Digital Platforms and Economics
  • Internet Traffic Analysis and Secure E-voting
  • Opinion Dynamics and Social Influence
  • Distributed Sensor Networks and Detection Algorithms
  • Crime Patterns and Interventions
  • Social Power and Status Dynamics
  • Reinforcement Learning in Robotics
  • Random Matrices and Applications
  • Survey Methodology and Nonresponse

Hebrew University of Jerusalem
2016-2025

Hebrew College
2023

California Institute of Technology
2011-2018

Cornell University
2010-2013

National Bureau of Economic Research
2013

Laboratoire d'Informatique de Paris-Nord
2010-2012

Carnegie Mellon University
2006-2011

We demonstrate that, ignoring computational constraints, it is possible to release privacy-preserving databases that are useful for all queries over a discretized domain from any given concept class with polynomial VC-dimension. show new lower bound releasing halfspace continuous domain. Despite this, we give time algorithm releases information queries, slightly relaxed definition of usefulness. Inspired by learning theory, introduce notion data privacy, which call distributional and...

10.1145/1374376.1374464 article EN 2008-05-17

In this article, we demonstrate that, ignoring computational constraints, it is possible to release synthetic databases that are useful for accurately answering large classes of queries while preserving differential privacy. Specifically, give a mechanism privately releases data class over discrete domain with error grows as function the size smallest net approximately representing answers queries. We show in particular implies counting gives guarantees grow only VC-dimension queries, which...

10.1145/2450142.2450148 article EN Journal of the ACM 2013-04-01

The 2024 Index is our most comprehensive to date and arrives at an important moment when AI's influence on society has never been more pronounced. This year, we have broadened scope extensively cover essential trends such as technical advancements in AI, public perceptions of the technology, geopolitical dynamics surrounding its development. Featuring original data than ever before, this edition introduces new estimates AI training costs, detailed analyses responsible landscape, entirely...

10.48550/arxiv.2405.19522 preprint EN arXiv (Cornell University) 2024-05-29

We propose weakening the assumption made when studying price of anarchy: Rather than assume that self-interested players will play according to a Nash equilibrium (which may even be computationally hard find), we only selfish so as minimize their own regret. Regret minimization can done via simple, efficient algorithms in many settings where number action choices for each player is exponential natural parameters problem. prove despite our weakened assumptions, several broad classes games,...

10.1145/1374376.1374430 article EN 2008-05-17

There has been substantial work developing simple, efficient no-regret algorithms for a wide class of repeated decision-making problems including online routing. These are adaptive strategies an individual can use that give strong guarantees on performance even in adversarially-changing environments. also analyzing properties Nash equilibria routing games. In this paper, we consider the question: if each player game uses strategy, will behavior converge to equilibrium? general games answer...

10.1145/1146381.1146392 article EN 2006-07-23

Consider the following problem: given a metric space, some of whose points are clients, select set at most k facility locations to minimize average distance from clients their nearest facility. This is just well-studied k-median problem, for which many approximation algorithms and hardness results known. Note that objective function encourages opening facilities in areas where there solution, it often possible get good idea located. raises quandary: what if sensitive information we would...

10.5555/1873601.1873691 article EN Symposium on Discrete Algorithms 2010-01-17

Previous chapter Next Full AccessProceedings Proceedings of the 2010 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)Differentially Private Combinatorial OptimizationAnupam Gupta, Katrina Ligett, Frank McSherry, Aaron Roth, and Kunal TalwarAnupam Talwarpp.1106 - 1125Chapter DOI:https://doi.org/10.1137/1.9781611973075.90PDFBibTexSections ToolsAdd to favoritesExport CitationTrack CitationsEmail SectionsAboutAbstract Consider following problem: given a metric space, some whose points are...

10.1137/1.9781611973075.90 article EN 2010-01-17

What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known data-privacy circles, failed anonymization attempts publicly released datasets. then provide mostly informal introduction several ideas from literature on differential privacy, an active computer science that studies formal approaches preserving privacy statistical databases. apply some its insights situations routinely faced by...

10.1257/jep.28.2.75 article EN The Journal of Economic Perspectives 2014-05-01

We present a new approach for mitigating unfairness in learned classifiers. In particular, we focus on binary classification tasks over individuals from two populations, where, as our criterion fairness, wish to achieve similar false positive rates both and negative populations. As proof of concept, implement empirically evaluate its ability fairness accuracy, using datasets the fields criminal risk assessment, credit, lending, college admissions.

10.48550/arxiv.1707.00044 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Welcome to the sixth edition of AI Index Report. This year, report introduces more original data than any previous edition, including a new chapter on public opinion, thorough technical performance chapter, analysis about large language and multimodal models, detailed trends in global legislation records, study environmental impact systems, more. The Report tracks, collates, distills, visualizes related artificial intelligence. Our mission is provide unbiased, rigorously vetted, broadly...

10.48550/arxiv.2310.03715 preprint EN cc-by-nc-nd arXiv (Cornell University) 2023-01-01

We consider a geometric model for the problem of minimizing access control lists (ACLs) in network routers, that also has applications to rectilinear picture compression and figure drawing common graphics software packages. Here goal is create colored pattern within an initially white rectangular canvas, basic operation choose subrectangle paint it single color, overwriting all previous colors rectangle. Rectangle Rule List (RRL) minimization finding shortest list rules needed given pattern....

10.5555/1283383.1283498 article EN Symposium on Discrete Algorithms 2007-01-07

We consider the problem of designing a survey to aggregate non-verifiable information from privacy-sensitive population: an analyst wants compute some statistic private bits held by each member population, but cannot verify correctness reported participants in his survey. Individuals population are strategic agents with cost for privacy, ie, they not only account payments expect receive mechanism, also their privacy costs any revealed about them mechanism's outcome---the computed as well...

10.1145/2600057.2602902 article EN 2014-05-30

We present new theoretical results on differentially private data release useful with respect to any target class of counting queries, coupled experimental a variety real world sets. Specifically, we study simple combination the multiplicative weights approach [Hardt and Rothblum, 2010] exponential mechanism [McSherry Talwar, 2007]. The framework allows us maintain improve distribution approximating given set queries. use select those queries most incorrectly tracked by current distribution....

10.48550/arxiv.1012.4763 preprint EN other-oa arXiv (Cornell University) 2010-01-01

We consider the problem of a data analyst who may purchase an unbiased estimate some statistic from multiple providers. From each provider i, has choice: she that variance chosen finite menu options. Each level cost associated with it, reported (possibly strategically) by provider. The wants to choose minimum set levels, one provider, will let her combine purchased estimators into aggregate estimator at most fixed desired level. Moreover, do so in such way incentivizes providers truthfully...

10.1145/2688073.2688106 article EN 2015-01-11

The traditional notion of generalization---i.e., learning a hypothesis whose empirical error is close to its true error---is surprisingly brittle. As has recently been noted in [DFH+15b], even if several algorithms have this guarantee isolation, the need not hold are composed adaptively. In paper, we study three notions generalization---increasing strength---that robust postprocessing and amenable adaptive composition, examine relationships between them. We call weakest such Robust...

10.48550/arxiv.1602.07726 preprint EN other-oa arXiv (Cornell University) 2016-01-01

This work studies formal utility and privacy guarantees for a simple multiplicative database transformation, where the data are compressed by random linear or affine reducing number of records substantially, while preserving original input variables.We provide an analysis framework inspired recent concept known as differential privacy. Our goal is to show that, despite general difficulty achieving guarantee, it possible publish synthetic that useful common statistical learning applications....

10.1109/isit.2009.5205863 article EN 2009-06-01

In an online linear optimization problem, on each period t, algorithm chooses $s_t\in\mathcal{S}$ from a fixed (possibly infinite) set $\mathcal{S}$ of feasible decisions. Nature (who may be adversarial) weight vector $w_t\in\mathbb{R}^n$, and the incurs cost $c(s_t,w_t)$, where c is function that in vector. full-information setting, $w_t$ then revealed to algorithm, bandit only experienced, revealed. The goal perform nearly as well best $s\in\mathcal{S}$ hindsight. Many repeated...

10.1137/070701704 article EN SIAM Journal on Computing 2009-01-01

We propose a simple model where individuals in privacy-sensitive population decide whether or not to participate pre-announced noisy computation by an analyst, so that the database itself is endogenously determined individuals' participation choices. The privacy agent receives depends both on announced noise level, as well how many agents choose database. Each has some minimum requirement, and decides based her requirement compares against expectation of she will receive if participates...

10.1145/2482540.2482585 article EN 2013-06-16
Coming Soon ...